A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acce
Defining Value Based Information Security Governance
โ Scribed by Sushma Mishra
- Publisher
- University of Calcutta
- Year
- 1995
- Tongue
- English
- Leaves
- 343
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This research argues that the information security governance objectives should be grounded in the values of organizational members. Research literature in decision sciences suggest that individual values play an important role in developing decision objectives. Information security governance objectives, based on values of the stakeholders, are essential for a comprehensive security control program. The study uses Value Theory as a theoretical basis and value focused thinking as a methodology to develop 23 objectives for information security governance. A case study was conducted to reexamine and interpret the significance of the proposed objectives in an organizational context. The results suggest three emergent dimensions of information security governance for effective control structure in organizations: resource allocation, user involvement and process integrity. The synthesis of data suggests eight principles of information security governance which guides organizations in achieving a comprehensive security environment. We also present a means-end model of ISG which proposes the interrelationships of the developed objectives. Contributions are noted and future research directions suggested.
โฆ Table of Contents
Recommended Citation......Page 1
๐ SIMILAR VOLUMES
<p><P>IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book
<p><P>IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book
"This book consists of 13 chapters and three appendices:Chapter 1 describes why activity-based cost management has become so relevant for the public sector and government organizations.Chapters 2, 3, and 4 describe why managerial accounting has evolved from reporting budget and spending information